CVE-2015-3145

The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
14.10
canonicalubuntu_linux
15.04
debiandebian_linux
7.0
haxxcurl
7.31.0
haxxcurl
7.32.0
haxxcurl
7.33.0
haxxcurl
7.34.0
haxxcurl
7.35.0
haxxcurl
7.36.0
haxxcurl
7.37.0
haxxcurl
7.37.1
haxxcurl
7.38.0
haxxcurl
7.39.0
haxxcurl
7.40.0
haxxcurl
7.41.0
applemac_os_x
10.10.0
applemac_os_x
10.10.1
applemac_os_x
10.10.2
applemac_os_x
10.10.3
applemac_os_x
10.10.4
oraclesolaris
11.3
haxxlibcurl
7.30.0
haxxlibcurl
7.31.0
haxxlibcurl
7.32.0
haxxlibcurl
7.33.0
haxxlibcurl
7.34.0
haxxlibcurl
7.35.0
haxxlibcurl
7.36.0
haxxlibcurl
7.37.0
haxxlibcurl
7.37.1
haxxlibcurl
7.38.0
haxxlibcurl
7.39
haxxlibcurl
7.40.0
haxxlibcurl
7.41.0
hpsystem_management_homepage
𝑥
≤ 7.5.3.1
opensuseopensuse
13.1
opensuseopensuse
13.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bullseye
7.74.0-1.3+deb11u13
fixed
wheezy
not-affected
squeeze
not-affected
bullseye (security)
7.74.0-1.3+deb11u11
fixed
bookworm
7.88.1-10+deb12u7
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
sid
8.10.1-2
fixed
trixie
8.10.1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
vivid
Fixed 7.38.0-3ubuntu2.2
released
utopic
Fixed 7.37.1-1ubuntu3.4
released
trusty
Fixed 7.35.0-1ubuntu2.5
released
precise
not-affected
lucid
not-affected
References